Description
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6379 | Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. |
Github GHSA |
GHSA-mxcc-7h5m-x57r | Jenkins GitHub plugin uses weak webhook signature function |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T10:14:29.453Z
Reserved: 2022-07-27T00:00:00.000Z
Link: CVE-2022-36885
No data.
Status : Modified
Published: 2022-07-27T15:15:08.980
Modified: 2024-11-21T07:13:59.317
Link: CVE-2022-36885
OpenCVE Enrichment
No data.
EUVD
Github GHSA